- 3
- 0
- 约 39页
- 2016-09-20 发布于浙江
- 举报
Chapter 16 : Concurrency Control Chapter 16: Concurrency Control Lock-Based Protocols Lock-Based Protocols (Cont.) Lock-Based Protocols (Cont.) Pitfalls陷阱 of Lock-Based Protocols Pitfalls of Lock-Based Protocols (Cont.) If we do not use locking, or if unlock data items as soon as possible after reading or writing them, we may get inconsistent states If we do not unlock a data item before requesting a lock on another data items, deadlocks may occur A locking protocol is a set of rules followed by all transactions while requesting and releasing locks. Locking protocols restrict the set of poss
您可能关注的文档
- “大手拉小手,共筑祖国新未来”社会实践报告.docx
- “大手拉小手,共筑祖国新未来”实践报告.doc
- 《Database System Concepts Course Introduction》ch01.ppt
- 《Database System Concepts Course Introduction》ch02.ppt
- 《Database System Concepts Course Introduction》ch03.ppt
- 《Database System Concepts Course Introduction》ch04.ppt
- 《Database System Concepts Course Introduction》ch06.ppt
- 《Database System Concepts Course Introduction》ch07.ppt
- 《Database System Concepts Course Introduction》ch12.ppt
- 《Database System Concepts Course Introduction》ch13.ppt
原创力文档

文档评论(0)